Power Adjusting and Bribery Racing: Novel Mining Attacks in the Bitcoin System

被引:48
|
作者
Gao, Shang [1 ]
Li, Zecheng [1 ]
Peng, Zhe [1 ]
Xiao, Bin [1 ]
机构
[1] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
关键词
Bitcoin; blockchain; mining attacks; selfish mining; block withholding; fork after withholding; bribery attack;
D O I
10.1145/3319535.3354203
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Mining attacks allow attackers to gain an unfair share of the mining reward by deviating from the honest mining strategy in the Bitcoin system. Among the most well-known are block withholding (BWH), fork after withholding (FAW), and selfish mining. In this paper, we propose two new strategies: power adjusting and bribery racing, and introduce two novel mining attacks, Power Adjusting Withholding (PAW) and Bribery Selfish Mining (BSM) adopting the new strategies. Both attacks can increase the reward of attackers. Furthermore, we show PAW can avoid the "miner's dilemma" in BWH attacks. BSM introduces a new "venal miner's dilemma", which results in all targets (bribes) willing to help the attacker but getting less reward finally. Quantitative analyses and simulations are conducted to verify the effectiveness of our attacks. We propose some countermeasures to mitigate the new attacks, but a practical and efficient solution remains to be an open problem.
引用
下载
收藏
页码:833 / 850
页数:18
相关论文
共 50 条
  • [41] The data mining and application in the power system
    Feng, L
    Zheng, W
    Gao, Y
    Gong, QX
    Meng, XP
    CCCT 2003, VOL 5, PROCEEDINGS: COMPUTER, COMMUNICATION AND CONTROL TECHNOLOGIES: II, 2003, : 1 - 3
  • [42] Research on monitoring technology of power stealing behavior in bitcoin mining based on analyzing electric energy data
    Kang, LiYan
    Shang, Ying
    Zhang, MuXin
    Liao, LiYing
    ENERGY REPORTS, 2022, 8 : 1183 - 1189
  • [43] Research on monitoring technology of power stealing behavior in bitcoin mining based on analyzing electric energy data
    Kang, LiYan
    Shang, Ying
    Zhang, MuXin
    Liao, LiYing
    Energy Reports, 2022, 8 : 1183 - 1189
  • [44] A Novel Gesture Driven Fuzzy Interface System For Car Racing Game
    Saha, Chiranjib
    Goswami, Debdipta
    Saha, Sriparna
    Konar, Amit
    Lekova, Anna
    Nagar, Atulya K.
    2015 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS (FUZZ-IEEE 2015), 2015,
  • [45] NOVEL PUMPING SYSTEM FOR OCEAN MINING
    DUCKWORTH, RA
    PUMPS-POMPES-PUMPEN, 1975, (102): : 655 - 661
  • [46] Power System Adequacy Assessment with Load Redistribution Attacks
    Xiang, Yingmeng
    Ding, Zhilu
    Wang, Lingfeng
    2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference (ISGT), 2015,
  • [47] Location of False Data Injection Attacks in Power System
    Jiang, Junjun
    Wu, Jing
    Long, Chengnian
    Li, Shaoyuan
    PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC), 2019, : 7473 - 7478
  • [48] Cascading Failures of Power System with the Consideration of Cyber Attacks
    Tu, Haicheng
    Shen, Hui-Liang
    Xia, Yongxiang
    2020 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2020,
  • [49] Investigating the Impact of Cyber Attacks on Power System Reliability
    Zhang, Yichi
    Wang, Lingfeng
    Sun, Weiqing
    2013 IEEE 3RD ANNUAL INTERNATIONAL CONFERENCE ON CYBER TECHNOLOGY IN AUTOMATION, CONTROL AND INTELLIGENT SYSTEMS (CYBER), 2013, : 462 - +
  • [50] Optimizing power system investments and resilience against attacks
    Fang, Yiping
    Sansavini, Giovanni
    RELIABILITY ENGINEERING & SYSTEM SAFETY, 2017, 159 : 161 - 173